id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-r39c-x95w-6gc8 | In Quest KACE Systems Management Appliance (SMA) through 12.0, a hash collision is possible during authentication. This may allow authentication with invalid credentials. | [] | null | 9.8 | null | null |
|
GHSA-gg88-333c-97wf | The Backup, Restore and Migrate WordPress Sites With the XCloner Plugin plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 4.7.3. This is due the plugin utilizing sabre without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website. | [] | null | 5.3 | null | null |
|
CVE-2017-0004 | The Local Security Authority Subsystem Service (LSASS) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to cause a denial of service (reboot) via a crafted authentication request, aka "Local Security Authority Subsystem Service Denial of Service Vulnerability." | [
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 |
|
CVE-2025-2631 | Out of Bounds Write Vulnerability in NI LabVIEW in InitCPUInformation() | Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions. | [] | 8.5 | 7.8 | null | null |
GHSA-ggx6-2xxf-36qq | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1037, CVE-2016-1063, CVE-2016-1064, CVE-2016-1071, CVE-2016-1072, CVE-2016-1073, CVE-2016-1074, CVE-2016-1076, CVE-2016-1077, CVE-2016-1078, CVE-2016-1080, CVE-2016-1081, CVE-2016-1082, CVE-2016-1083, CVE-2016-1084, CVE-2016-1085, CVE-2016-1086, CVE-2016-1088, CVE-2016-1093, CVE-2016-1095, CVE-2016-1116, CVE-2016-1118, CVE-2016-1119, CVE-2016-1120, CVE-2016-1123, CVE-2016-1124, CVE-2016-1125, CVE-2016-1126, CVE-2016-1127, CVE-2016-1128, CVE-2016-1129, CVE-2016-1130, CVE-2016-4088, CVE-2016-4089, CVE-2016-4090, CVE-2016-4093, CVE-2016-4094, CVE-2016-4096, CVE-2016-4097, CVE-2016-4098, CVE-2016-4099, CVE-2016-4100, CVE-2016-4101, CVE-2016-4103, and CVE-2016-4105. | [] | null | null | 9.8 | null |
|
CVE-2019-1233 | A denial of service vulnerability exists in Microsoft Exchange Server software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Denial of Service Vulnerability'. | [
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_12:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_13:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_2:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
GHSA-fg88-qmgw-rwmp | Cross-site scripting (XSS) vulnerability in Xerox MicroServer Web Server in Document Centre 220 through 265, 332 and 340, 420 through 490, and 535 through 555 allows remote attackers to inject arbitrary web script or HTML and modify web pages via unknown vectors. | [] | null | null | null | null |
|
GHSA-mhv8-2q5p-jrwx | An issue was discovered in baijiacms v4. There is a CSRF vulnerability that can modify the store information and login password. | [] | null | 6.5 | null | null |
|
GHSA-8mrq-m68x-jfcm | The vulnerability allows a malicious low-privileged PAM user to perform server upgrade related actions. | [] | 5.1 | null | null | null |
|
CVE-2021-40024 | Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. | [
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-px78-xv49-wxhw | MySimpleNews 1.0 allows remote attackers to delete arbitrary email messages via a direct request to vider.php3. | [] | null | null | null | null |
|
GHSA-rhvr-6w8c-6v7w | Mattermost fails to invalidate all active sessions when converting a user to a bot | Mattermost versions 9.11.x <= 9.11.6, 10.4.x <= 10.4.1 fail to invalidate all active sessions when converting a user to a bot, with allows the converted user to escalate their privileges depending on the permissions granted to the bot. | [] | null | 3.1 | null | null |
CVE-2023-2690 | SourceCodester Personnel Property Equipment System GET Parameter returned_reuse_form.php sql injection | A vulnerability, which was classified as critical, has been found in SourceCodester Personnel Property Equipment System 1.0. This issue affects some unknown processing of the file admin/returned_reuse_form.php of the component GET Parameter Handler. The manipulation of the argument client_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228971. | [
"cpe:2.3:a:personnel_property_equipment_system_project:personnel_property_equipment_system:1.0:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
GHSA-34wv-v24v-vm88 | An issue was discovered on Belkin Wemo Switch 28B WW_2.00.11057.PVT-OWRT-SNS devices. They allow remote attackers to cause a denial of service (persistent rules-processing outage) via a crafted ruleDbBody element in a StoreRules request to the upnp/control/rules1 URI, because database corruption occurs. | [] | null | null | null | null |
|
GHSA-f2vf-33g3-fwm2 | The Salon Booking System, Appointment Scheduling for Salons, Spas & Small Businesses WordPress plugin before 1.9.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] | null | 4.8 | null | null |
|
RHSA-2022:5192 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | argocd: vulnerable to an uncontrolled memory consumption bug argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access | [
"cpe:/a:redhat:openshift_gitops:1.3::el8"
] | null | 4.3 | null | null |
GHSA-5cv5-75c5-879q | MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error. | [] | null | null | null | null |
|
GHSA-8mqm-pq95-4fc3 | /usr/libexec/openldap/generate-server-cert.sh in openldap-servers sets weak permissions for the TLS certificate, which allows local users to obtain the TLS certificate by leveraging a race condition between the creation of the certificate, and the chmod to protect it. | [] | null | null | 4.7 | null |
|
GHSA-q5ff-63c8-hcx3 | In ffu_flash_pack of ffu.c, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. | [] | null | 5.1 | null | null |
|
CVE-2006-0163 | SQL injection vulnerability in the search module (modules/Search/index.php) of PHPNuke EV 7.7 -R1 allows remote attackers to execute arbitrary SQL commands via the query parameter, which is used by the search field. NOTE: This is a different vulnerability than CVE-2005-3792. | [
"cpe:2.3:a:francisco_burzi:php-nuke_ev:7.7_r1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2019-17602 | An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated. | [
"cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124011:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124012:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124013:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124014:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124015:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124016:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124022:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124023:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124024:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124025:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124026:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124027:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124030:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124033:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124037:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124039:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124040:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124041:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124042:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124043:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124051:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124053:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124054:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124056:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124058:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124065:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124066:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124067:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124069:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124070:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124071:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124074:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124075:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124081:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124082:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124085:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124086:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124087:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-mqwc-9q6f-pv6q | Directory traversal vulnerability in ver.2.8.4.0 and earlier and ver.3.3.0.0 and earlier allows an attacker to create or overwrite existing files via specially crafted ATC file. | [] | null | null | 5.5 | null |
|
CVE-2018-20346 | SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan. | [
"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
] | null | null | 8.1 | 6.8 |
|
CVE-2025-27342 | WordPress WooCommerce Recargo de Equivalencia Plugin <= 1.6.24 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in josesan WooCommerce Recargo de Equivalencia allows Cross Site Request Forgery. This issue affects WooCommerce Recargo de Equivalencia: from n/a through 1.6.24. | [] | null | 4.3 | null | null |
CVE-2024-31087 | WordPress pageMash plugin <= 1.3.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joel Starnes pageMash > Page Management allows Reflected XSS.This issue affects pageMash > Page Management: from n/a through 1.3.0.
| [] | null | 7.1 | null | null |
CVE-2007-0884 | Buffer overflow in Roaring Penguin MIMEDefang 2.59 and 2.60 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:roaring_penguin:mimedefang:2.59:*:*:*:*:*:*:*",
"cpe:2.3:a:roaring_penguin:mimedefang:2.60:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2023:7373 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty | [
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 7.8 | null | null |
GHSA-6cvr-wmr3-636f | Transient DOS while decoding attach reject message received by UE, when IEI is set to ESM_IEI. | [] | null | 7.5 | null | null |
|
GHSA-gw3c-jrpr-59hg | Xenstore: Guests can create orphaned Xenstore nodes By creating multiple nodes inside a transaction resulting in an error, a malicious guest can create orphaned nodes in the Xenstore data base, as the cleanup after the error will not remove all nodes already created. When the transaction is committed after this situation, nodes without a valid parent can be made permanent in the data base. | [] | null | 5.5 | null | null |
|
GHSA-hmww-m5wm-539p | Inappropriate authorization vulnerability in the system apps. Successful exploitation of this vulnerability may affect service integrity. | [] | null | 7.5 | null | null |
|
CVE-2013-7406 | SQL injection vulnerability in the MRBS module for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:mrbs_project:mrbs:1.4.0:*:*:*:*:drupal:*:*",
"cpe:2.3:a:mrbs_project:mrbs:1.4.8:*:*:*:*:drupal:*:*"
] | null | null | null | 7.5 |
|
CVE-2014-3421 | lisp/gnus/gnus-fun.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gnus.face.ppm temporary file. | [
"cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*",
"cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:20.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:20.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:20.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:20.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:21.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:22.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:23.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:23.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:23.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:emacs:24.2:*:*:*:*:*:*:*"
] | null | null | null | 3.3 |
|
RHSA-2023:3465 | Red Hat Security Advisory: kernel security and bug fix update | kernel: net/ulp: use-after-free in listening ULP sockets kernel: udmabuf: improper validation of array index leading to local privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation | [
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/a:redhat:rhel_eus:9.0::crb",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.8 | null | null |
CVE-2007-3923 | The Common Internet File System (CIFS) optimization in Cisco Wide Area Application Services (WAAS) 4.0.7 and 4.0.9, as used by Cisco WAE appliance and the NM-WAE-502 network module, when Edge Services are configured, allows remote attackers to cause a denial of service (loss of service) via a flood of TCP SYN packets to port (1) 139 or (2) 445. | [
"cpe:2.3:h:cisco:wide_area_application_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wide_area_application_engine_nm-wae-502:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wide_area_application_services:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wide_area_application_services:4.0.9:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2013-2218 | Double free vulnerability in the virConnectListAllInterfaces method in interface/interface_backend_netcf.c in libvirt 1.0.6 allows remote attackers to cause a denial of service (libvirtd crash) via a filtering flag that causes an interface to be skipped, as demonstrated by the "virsh iface-list --inactive" command. | [
"cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2022-22272 | Improper authorization in TelephonyManager prior to SMR Jan-2022 Release 1 allows attackers to get IMSI without READ_PRIVILEGED_PHONE_STATE permission | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 4 | null | null |
|
CVE-2006-5734 | Multiple PHP remote file inclusion vulnerabilities in ATutor 1.5.3.2 allow remote attackers to execute arbitrary PHP code via a URL in the (1) section parameter in (a) documentation/common/frame_toc.php and (b) documentation/common/search.php, the (2) req_lang parameter in documentation/common/search.php and (c) documentation/common/vitals.inc.php, the (3) row[dir_name] parameter in (d) include/classes/module/module.class.php, and the (4) lang_path parameter in (e) include/classes/phpmailer/class.phpmailer.php. NOTE: the print.php vector is already covered by CVE-2005-3404. | [
"cpe:2.3:a:adaptive_technology_resource_centre:atutor:1.5.3.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-3368-73h5-mjmr | The Premium Addons for Elementor plugin for WordPress is vulnerable to Arbitrary Option Updates in versions up to, and including, 4.5.1. This is due to missing capability and nonce checks in the pa_dismiss_admin_notice AJAX action. This makes it possible for authenticated subscriber+ attackers to change arbitrary options with a restricted value of 1 on vulnerable WordPress sites. | [] | null | 6.5 | null | null |
|
GHSA-8p36-54g9-43pf | Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-6342. | [] | null | null | null | null |
|
RHSA-2023:6197 | Red Hat Security Advisory: thunderbird security update | Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 7.5 | null | null |
GHSA-hv6f-36rr-r48j | The EFBP_verify_upload_file AJAX action of the Easy Form Builder WordPress plugin through 1.0, available to authenticated users, does not have any security in place to verify uploaded files, allowing low privilege users to upload arbitrary files, leading to RCE. | [] | null | null | null | null |
|
CVE-2024-55637 | Drupal core - Moderately critical - Gadget chain - SA-CORE-2024-007 | Deserialization of Untrusted Data vulnerability in Drupal Core allows Object Injection.This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8.
Drupal core contains a chain of methods that is exploitable when an insecure deserialization vulnerability exists on the site. This so-called gadget chain presents no direct threat but is a vector that can be used to achieve remote code execution if the application deserializes untrusted data due to another vulnerability. | [] | null | 9.8 | null | null |
CVE-2025-24236 | An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access sensitive user data. | [] | null | 5.5 | null | null |
|
RHSA-2022:1264 | Red Hat Security Advisory: Red Hat OpenStack Platform 13.0 (python-waitress) security update | waitress: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') | [
"cpe:/a:redhat:openstack:13::el7"
] | null | 7.5 | null | null |
CVE-2019-2941 | Vulnerability in the Hyperion Profitability and Cost Management product of Oracle Hyperion (component: Modeling). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion Profitability and Cost Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Hyperion Profitability and Cost Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Hyperion Profitability and Cost Management accessible data as well as unauthorized read access to a subset of Hyperion Profitability and Cost Management accessible data. CVSS 3.0 Base Score 4.0 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:hyperion_enterprise_performance_management_architect:11.1.2.4:*:*:*:*:*:*:*"
] | null | 4 | null | 3.6 |
|
CVE-2005-1677 | Unknown vulnerability in Groove Virtual Office before 3.1 build 2338, before 3.1a build 2364, and Groove Workspace before 2.5n build 1871 allows remote attackers to bypass restrictions on COM objects. | [
"cpe:2.3:a:groove:groove_workspace:*:*:*:*:*:*:*:*",
"cpe:2.3:a:groove:virtual_office:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-mmq7-3rpr-64pv | TURCK BL20 Programmable Gateway and BL67 Programmable Gateway have hardcoded accounts, which allows remote attackers to obtain administrative access via an FTP session. | [] | null | null | null | null |
|
GHSA-qjjp-gpj3-qwwr | Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 20.12.1.0-20.12.21.5, 21.12.1.0-21.12.20.0, 22.12.1.0-22.12.16.0 and 23.12.1.0-23.12.10.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera P6 Enterprise Project Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). | [] | null | 5.4 | null | null |
|
CVE-2018-13660 | The mint function of a smart contract implementation for BillionRewardsToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:billionrewardstoken_project:billionrewardstoken:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2005-4822 | SQL injection vulnerability in projects/project-edit.asp in Digger Solutions Intranet Open Source (IOS) version 2.7.2 allows remote attackers to execute arbitrary SQL commands via the project_id parameter. | [
"cpe:2.3:a:digger_solutions:intranet_open_source:2.7.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-3qcc-7w94-cc7w | SQL injection vulnerability in DWdirectory 2.1 and earlier allows remote attackers to execute arbitrary SQL commands via the search parameter to the /search URI. | [] | null | null | null | null |
|
GHSA-gxf5-48mh-hgpm | IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 219510. | [] | null | 9.8 | null | null |
|
GHSA-9vv4-43m2-mhhp | NETGEAR RAX5 (AX1600 WiFi Router) V1.0.2.26 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_do_enr_pbc_wps function. | [] | null | 6.5 | null | null |
|
CVE-2008-0253 | SQL injection vulnerability in full_text.php in Binn SBuilder allows remote attackers to execute arbitrary SQL commands via the nid parameter. | [
"cpe:2.3:a:binn:sbuilder:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-cmxv-46jr-p425 | Directory traversal vulnerability in index.php in PHP Multiple Newsletters 2.7, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter. | [] | null | null | null | null |
|
CVE-2023-32101 | WordPress Library Viewer Plugin <= 2.0.6 is vulnerable to Open Redirection | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Pexle Chris Library Viewer.This issue affects Library Viewer: from n/a through 2.0.6.
| [
"cpe:2.3:a:pexlechris:library_viewer:*:*:*:*:*:wordpress:*:*"
] | null | 4.7 | null | null |
GHSA-23jc-43ph-xg8h | An out-of-bounds access vulnerability in the Unauthorized Change Prevention service of Trend Micro Apex One and Apex One as a Service could allow a local attacker to elevate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | [] | null | 7.8 | null | null |
|
GHSA-78gc-w4gp-4799 | The kernel in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 does not enforce the read-only attribute of a shared memory segment during use of a custom cache mode, which allows attackers to bypass intended access restrictions via a crafted app. | [] | null | null | null | null |
|
CVE-2024-45650 | IBM Security Verify Directory denial of service | IBM Security Verify Directory 10.0 through 10.0.3 is vulnerable to a denial of service when sending an LDAP extended operation. | [
"cpe:2.3:a:ibm:security_verify_directory:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_verify_directory:10.0.3:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-r5gf-w27r-jjqq | PHP remote file inclusion vulnerability in add-ons/modules/sysmanager/plugins/install.plugin.php in Aurora CMS 1.0.2 allows remote attackers to execute arbitrary PHP code via a URL in the AURORA_MODULES_FOLDER parameter. | [] | null | null | null | null |
|
GHSA-64gv-qg2v-vxv6 | Array size is not checked in sized-chunks | An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with From<InlineArray<A, T>>. | [] | null | 7.5 | null | null |
GHSA-2qrj-g9hq-chph | Umbraco.Forms has HTML injection vulnerability in 'Send email' workflow | ImpactThe 'Send email' workflow does not HTML encode the user-provided field values in the sent email message, making any form with this workflow configured vulnerable, as it allows sending the message from a trusted system and address (potentially bypassing spam and email client security systems).PatchesThis issue affects all (supported) versions Umbraco Forms and is patched in 13.4.2 and 15.1.2.WorkaroundsUnpatched or unsupported versions can workaround this issue by using the 'Send email with template (Razor)' workflow instead or [writing a custom workflow type](https://docs.umbraco.com/umbraco-forms/developer/extending/adding-a-workflowtype).To avoid accidentally using the vulnerable workflow again, the `SendEmail` workflow type can be removed using the following composer (tested on Umbraco 10, 13, 14 and 15): | [] | 2.3 | 0 | null | null |
GHSA-cg6w-97rj-9hvv | Lack of escaping allowed HTML injection when a webpage was viewed in Reader View. While a Content Security Policy prevents direct code execution, HTML injection is still possible. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 88. | [] | null | null | null | null |
|
GHSA-v3pv-ppv6-v9rf | Due to missing encoding in SAP Contact Center's Communication Desktop component- version 700, an attacker could send malicious script in chat message. When the message is accepted by the chat recipient, the script gets executed in their scope. Due to the usage of ActiveX in the application, the attacker can further execute operating system level commands in the chat recipient's scope. This could lead to a complete compromise of their confidentiality, integrity, and could temporarily impact their availability. | [] | null | null | null | null |
|
GHSA-hghm-3vc3-hppj | A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability. | [] | null | 5.6 | null | null |
|
GHSA-24pg-vqrw-x656 | Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability | [] | null | 8.8 | null | null |
|
GHSA-mggc-5qcw-3q96 | SQL injection vulnerability in Infinity WEB 1.0 allows remote attackers to bypass authentication and gain privileges via the login page. | [] | null | null | null | null |
|
CVE-2002-1872 | Microsoft SQL Server 6.0 through 2000, with SQL Authentication enabled, uses weak password encryption (XOR), which allows remote attackers to sniff and decrypt the password. | [
"cpe:2.3:a:microsoft:sql_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:7.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:7.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:7.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:7.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2000:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2000:sp2:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2025-30793 | WordPress Houzez Property Feed plugin <= 2.5.4 - Arbitrary File Download Vulnerability | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Property Hive Houzez Property Feed allows Path Traversal. This issue affects Houzez Property Feed: from n/a through 2.5.4. | [] | null | 7.5 | null | null |
CVE-2005-3399 | Multiple interpretation error in CAT-QuickHeal 8.0 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug." | [
"cpe:2.3:a:cat:quick_heal:8.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2014-6873 | The AMGC (aka com.amec.uae) application 6.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:amecuae:amgc:6:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-h55q-7cr6-wwr6 | The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076. | [] | null | null | 3.8 | null |
|
CVE-2010-1215 | Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 do not properly implement access to a content object through a SafeJSObjectWrapper (aka SJOW) wrapper, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging "access to an object from the chrome scope." | [
"cpe:2.3:a:mozilla:firefox:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2021-21106 | Use after free in autofill in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 9.6 | null | 9.3 |
|
GHSA-hwwj-8rjh-78m2 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LambertGroup SHOUT allows SQL Injection. This issue affects SHOUT: from n/a through 3.5.3. | [] | null | 8.5 | null | null |
|
CVE-2015-0206 | Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection. | [
"cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-23f5-whxg-92j5 | Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764. | [] | null | null | null | null |
|
CVE-2009-0041 | IAX2 in Asterisk Open Source 1.2.x before 1.2.31, 1.4.x before 1.4.23-rc4, and 1.6.x before 1.6.0.3-rc2; Business Edition A.x.x, B.x.x before B.2.5.7, C.1.x.x before C.1.10.4, and C.2.x.x before C.2.1.2.1; and s800i 1.2.x before 1.3.0 responds differently to a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. | [
"cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:*:beta8:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:*:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:*:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.0beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.2:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.3:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.10:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.11:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.12:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.12.1:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.13:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.14:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.15:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.16:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.17:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.18:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.19:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.20:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.21:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.21.1:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.22:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.23:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.24:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.25:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.26:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.26.1:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.26.2:netsec:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.28:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.29:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.30.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.2.30.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.19:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.19:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.19:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.19:rc4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.20:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.20:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.20:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.21:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.21:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.22:rc3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.22:rc4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.23:rc1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4.23:rc2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4_revision_95946:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.4beta:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.0:beta7.1:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:open_source:1.6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:h:asterisk:s800i_appliance:1.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-mm8m-pwcf-xh4m | An elevation of privilege vulnerability in the Qualcomm bus driver in Android before 2016-11-05 could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Android ID: A-30311977. References: Qualcomm QC-CR#1050455. | [] | null | null | 7.8 | null |
|
PYSEC-2014-5 | null | The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name. | [] | null | null | null | null |
GHSA-7w8r-vmhh-7vf4 | Cross-site scripting (XSS) vulnerability in the administrative interface in Cisco WebEx Meetings Server 2.5 and 2.5.0.997 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuq86310. | [] | null | null | null | null |
|
CVE-2024-3436 | SourceCodester Prison Management System Avatar edit-photo.php unrestricted upload | A vulnerability was found in SourceCodester Prison Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /Admin/edit-photo.php of the component Avatar Handler. The manipulation of the argument avatar leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-259630 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:sourcecodester:prison_management_system:1.0:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
CVE-2024-25632 | Unauthorised granting of administrator privileges over arbitrary teams under certain circumstances | eLabFTW is an open source electronic lab notebook for research labs. In the context of eLabFTW, an administrator is a user account with certain privileges to manage users and content in their assigned team/teams. A user may be an administrator in one team and a regular user in another. The vulnerability allows a regular user to become administrator of a team where they are a member, under a reasonable configuration. Additionally, in eLabFTW versions subsequent to v5.0.0, the vulnerability may allow an initially unauthenticated user to gain administrative privileges over an arbitrary team. The vulnerability does not affect system administrator status. Users should upgrade to version 5.1.0. System administrators are advised to turn off local user registration, saml_team_create and not allow administrators to import users into teams, unless strictly required. | [] | null | 8.6 | null | null |
GHSA-824c-c5r2-qg3x | Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities. | [] | null | 8.1 | null | null |
|
GHSA-xm67-587q-r2vw | wasmtime vulnerable to miscompilation of `i8x16.select` with the same inputs on x86_64 | ImpactWasmtime's code generation backend, Cranelift, has a bug on x86_64 platforms for the WebAssembly `i8x16.select` instruction which will produce the wrong results when the same operand is provided to the instruction and some of the selected indices are greater than 16. There is an off-by-one error in the calculation of the mask to the `pshufb` instruction which causes incorrect results to be returned if lanes are selected from the second vector.The impact of this miscompilation is that the WebAssembly instruction can produce incorrect results for the `i8x16.select` instruction. This should have no effect on embedders and does not represent a sandbox escape, for example. Guest programs, however, may behave unexpectedly due to the incorrect result of this instruction. In extreme cases if a guest program is handling untrusted input then the guest program may deviate from its intended execution, for example calling an imported host function with different arguments than intended. This still does not impact embedders, however, because there is no form of privilege escalation with the guest.At this time it's expected that this codegen pattern doesn't show up in the wild that often. LLVM-generated modules, for example, do not appear to conventionally or idiomatically generate code which would hit this bug. It is possible, however, to still write code which triggers this, so it's recommended for embedders to analyze existing modules to see if any are affected.PatchesThis codegen bug has been fixed in Wasmtime 6.0.1, 5.0.1, and 4.0.1. Users are recommended to upgrade to these updated versions.WorkaroundsIf upgrading is not an option for you at this time, you can avoid this miscompilation by [disabling the Wasm simd proposal](https://docs.rs/wasmtime/latest/wasmtime/struct.Config.html#method.wasm_simd)Additionally the bug is only present on x86_64 hosts. Other platforms such as AArch64 and s390x are not affected.References[The WebAssembly simd proposal](https://github.com/webassembly/simd)[Mailing list announcement](https://groups.google.com/a/bytecodealliance.org/g/sec-announce/c/Mov-ItrNJsQ)[GitHub advisory](https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-xm67-587q-r2vw)[Commit to fix this issue on Wasmtime's `main` branch](https://github.com/bytecodealliance/wasmtime/commit/5dc2bbccbb363e474d2c9a1b8e38a89a43bbd5d1)For more informationIf you have any questions or comments about this advisory:Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime)Open an issue in [the bytecodealliance/wasmtime repository](https://github.com/bytecodealliance/wasmtime/) | [] | null | 3.1 | null | null |
CVE-2021-35214 | Session Management Vulnerability | The vulnerability in SolarWinds Pingdom can be described as a failure to invalidate user session upon password or email address change. When running multiple active sessions in separate browser windows, it was observed a password or email address change could be changed without terminating the user session. This issue has been resolved on September 13, 2021. | [
"cpe:2.3:a:solarwinds:pingdom:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
CVE-2023-2303 | The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.6.4. This is due to missing nonce validation in the vcita-callback.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:vcita:contact_form_and_calls_to_action_by_vcita:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null |
|
GHSA-4fcv-w3qc-ppgg | rust-openssl Use-After-Free in `Md::fetch` and `Cipher::fetch` | When a `Some(...)` value was passed to the `properties` argument of either of these functions, a use-after-free would result.In practice this would nearly always result in OpenSSL treating the properties as an empty string (due to `CString::drop`'s behavior).The maintainers thank [quitbug](https://github.com/quitbug/) for reporting this vulnerability to us. | [] | 6.3 | null | null | null |
GHSA-m4w3-m27v-5467 | Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used. | [] | null | null | null | null |
|
GHSA-c22m-cqmp-648p | Vulnerability in the Oracle iStore component of Oracle E-Business Suite (subcomponent: Shopping Cart). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [] | null | null | null | null |
|
GHSA-cf7m-hm28-rpmp | The All in One SEO WordPress plugin before 4.1.5.3 is affected by a Privilege Escalation issue, which was discovered during an internal audit by the Jetpack Scan team, and may grant bad actors access to protected REST API endpoints they shouldn’t have access to. This could ultimately enable users with low-privileged accounts, like subscribers, to perform remote code execution on affected sites. | [] | null | 8.8 | null | null |
|
GHSA-gmwx-qv5p-38rc | An Improper Release of Memory Before Removing Last Reference vulnerability in the Session Initiation Protocol (SIP) Application Layer Gateway (ALG) of Juniper Networks Junos OS allows unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On all MX and SRX platforms, if the SIP ALG is enabled, receipt of a specific SIP packet will create a stale SIP entry. Sustained receipt of such packets will cause the SIP call table to eventually fill up and cause a DoS for all SIP traffic. The SIP call usage can be monitored by "show security alg sip calls". To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX with: user@host> show security alg status | match sip SIP : Enabled Please verify on MX whether the following is configured: [ services ... rule <rule-name> (term <term-name>) from/match application/application-set <name> ] where either a. name = junos-sip or an application or application-set refers to SIP: b. [ applications application <name> application-protocol sip ] or c. [ applications application-set <name> application junos-sip ] This issue affects Juniper Networks Junos OS on SRX Series and MX Series: 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R2-S2; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. | [] | null | 5.3 | null | null |
|
CVE-2025-37864 | net: dsa: clean up FDB, MDB, VLAN entries on unbind | In the Linux kernel, the following vulnerability has been resolved:
net: dsa: clean up FDB, MDB, VLAN entries on unbind
As explained in many places such as commit b117e1e8a86d ("net: dsa:
delete dsa_legacy_fdb_add and dsa_legacy_fdb_del"), DSA is written given
the assumption that higher layers have balanced additions/deletions.
As such, it only makes sense to be extremely vocal when those
assumptions are violated and the driver unbinds with entries still
present.
But Ido Schimmel points out a very simple situation where that is wrong:
https://lore.kernel.org/netdev/ZDazSM5UsPPjQuKr@shredder/
(also briefly discussed by me in the aforementioned commit).
Basically, while the bridge bypass operations are not something that DSA
explicitly documents, and for the majority of DSA drivers this API
simply causes them to go to promiscuous mode, that isn't the case for
all drivers. Some have the necessary requirements for bridge bypass
operations to do something useful - see dsa_switch_supports_uc_filtering().
Although in tools/testing/selftests/net/forwarding/local_termination.sh,
we made an effort to popularize better mechanisms to manage address
filters on DSA interfaces from user space - namely macvlan for unicast,
and setsockopt(IP_ADD_MEMBERSHIP) - through mtools - for multicast, the
fact is that 'bridge fdb add ... self static local' also exists as
kernel UAPI, and might be useful to someone, even if only for a quick
hack.
It seems counter-productive to block that path by implementing shim
.ndo_fdb_add and .ndo_fdb_del operations which just return -EOPNOTSUPP
in order to prevent the ndo_dflt_fdb_add() and ndo_dflt_fdb_del() from
running, although we could do that.
Accepting that cleanup is necessary seems to be the only option.
Especially since we appear to be coming back at this from a different
angle as well. Russell King is noticing that the WARN_ON() triggers even
for VLANs:
https://lore.kernel.org/netdev/[email protected]/
What happens in the bug report above is that dsa_port_do_vlan_del() fails,
then the VLAN entry lingers on, and then we warn on unbind and leak it.
This is not a straight revert of the blamed commit, but we now add an
informational print to the kernel log (to still have a way to see
that bugs exist), and some extra comments gathered from past years'
experience, to justify the logic. | [] | null | null | null | null |
CVE-2017-7899 | An Information Exposure issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. User credentials are sent to the web server using the HTTP GET method, which may result in the credentials being logged. This could make user credentials available for unauthorized retrieval. | [
"cpe:2.3:a:rockwellautomation:1763-l16awa_series_a:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1763-l16awa_series_b:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1763-l16bbb_series_a:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1763-l16bbb_series_b:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1763-l16bwa_series_a:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1763-l16bwa_series_b:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1763-l16dwd_series_a:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1763-l16dwd_series_b:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:ab_micrologix_controller:1100:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1766-l32awa_series_a:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1766-l32awa_series_b:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1766-l32awaa_series_a:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1766-l32awaa_series_b:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1766-l32bwa_series_a:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1766-l32bwa_series_b:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1766-l32bwaa_series_a:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1766-l32bwaa_series_b:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1766-l32bxb_series_a:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1766-l32bxb_series_b:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1766-l32bxba_series_a:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:1766-l32bxba_series_b:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:ab_micrologix_controller:1400:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 |
|
GHSA-m63c-qqgh-g8hh | Missing Authorization vulnerability in WP Desk Flexible Checkout Fields for WooCommerce.This issue affects Flexible Checkout Fields for WooCommerce: from n/a through 4.1.2. | [] | null | 4.3 | null | null |
|
GHSA-3p9g-q4q3-x6mr | Cross-site scripting (XSS) vulnerability in edit.php in wellyblog allows remote attackers to inject arbitrary web script or HTML via the articleid parameter in an add action. | [] | null | null | null | null |
|
CVE-2022-47166 | WordPress Void Contact Form 7 Widget For Elementor Page Builder Plugin <= 2.1.1 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in voidCoders Void Contact Form 7 Widget For Elementor Page Builder plugin <= 2.1.1 versions. | [
"cpe:2.3:a:voidcoders:void_contact_form_7_widget_for_elementor_page_builder:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
GHSA-9mvq-97pq-fpww | In bnep_process_control_packet of bnep_utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-69177292. | [] | null | null | 7.5 | null |
|
RHSA-2024:8906 | Red Hat Security Advisory: Satellite 6.16.0 release | micromatch: vulnerable to Regular Expression Denial of Service github.com/jaraco/zipp: Denial of Service (infinite loop) via crafted zip file in jaraco/zipp puppet-foreman: An authentication bypass vulnerability exists in Foreman grpc: client communicating with a HTTP/2 proxy can poison the HPACK table between the proxy and the backend puppet-pulpcore: An authentication bypass vulnerability exists in pulpcore mosquitto: sending specific sequences of packets may trigger memory leak foreman: Read-only access to entire DB from templates node-tar: denial of service while parsing a tar file due to lack of folders depth validation urllib3: proxy-authorization request header is not stripped during cross-origin redirects python-django: Potential denial-of-service in django.utils.html.urlize() python-django: Username enumeration through timing difference for users with unusable passwords python-django: Potential directory-traversal in django.core.files.storage.Storage.save() python-django: Potential denial-of-service in django.utils.translation.get_supported_language_variant() python-django: Potential SQL injection in QuerySet.values() and values_list() | [
"cpe:/a:redhat:satellite:6.16::el8",
"cpe:/a:redhat:satellite:6.16::el9",
"cpe:/a:redhat:satellite_capsule:6.16::el8",
"cpe:/a:redhat:satellite_capsule:6.16::el9",
"cpe:/a:redhat:satellite_maintenance:6.16::el8",
"cpe:/a:redhat:satellite_maintenance:6.16::el9",
"cpe:/a:redhat:satellite_utils:6.16::el8",
"cpe:/a:redhat:satellite_utils:6.16::el9"
] | null | 7.3 | 9.8 | null |
GHSA-hgx8-vqrh-29gx | An issue in MOKO TECHNOLOGY LTD MOKOSmart MKGW1 BLE Gateway v.1.1.1 and before allows a remote attacker to escalate privileges via the session management component of the administrative web interface. | [] | null | 8.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.